
The SolarWinds Hack: Resources and Guidance from Cybersecurity Experts
Find out how your organization can mitigate risks and respond to the SolarWinds Hack in this guide from leading cybersecurity experts.
Find out how your organization can mitigate risks and respond to the SolarWinds Hack in this guide from leading cybersecurity experts.
With work/learn-from-home growing, IT staff in education face unique challenges in securing connectivity for students and faculty in their homes. In this blog post, John Headley highlights two other special concerns for IT and cybersecurity in education and his recommendations.
This major security flaw could impact nearly 200,000 currently-deployed FortiGate firewalls. Learn how to check for this vulnerability and how to resolve it.
From email security to zero trust network access, John Headley recommends 10 tools to defend against ransomware.
The traditional “trust but verify” model hasn’t been able to withstand today’s cybersecurity threat landscape. Here’s how the Zero Trust Model is different.
EDR stands for Endpoint Detection & Response. Learn how EDR goes beyond what is offered by standard endpoint protection platform (EPP), i.e. traditional antivirus products.
Two of the most popular options for setting up a remote workspace are VPN and VDI. It’s important to know the differences between each option in order to select the right fit for your business.
If you have home Wi-Fi, chances are you have a router that goes along with it. But has it ever crossed your mind that your router can also be compromised?
Since our phones have become such a crucial part of our lives, we should make every effort to put good cyber security habits to make sure that your smartphone is safeguarded.
Ah, yes: passwords. Something we all use daily, but don’t think twice about securing, even though we should. Here are a few practicalities you should consider when it comes to creating and resetting your password.